Home / malware Worm:Win32/Morto.C
First posted on 29 November 2011.
Source: SecurityHomeAliases :
There are no other names known for Worm:Win32/Morto.C.
Explanation :
Worm:Win32/Morto.C is malware that performs the main payload for Worm:Win32/Morto.gen!A, Worm:Win32/Morto.A, and Worm:Win32/Morto.B.
Top
Worm:Win32/Morto.C is malware that performs the main payload for Worm:Win32/Morto.gen!A, Worm:Win32/Morto.A, and Worm:Win32/Morto.B.
Installation
Worm:Win32/Morto.C is a DLL file that performs the main Morto payload.
When executed, it is installed as the following files:
- %windir%\clb.dll
- %windir%\offline web pages\cache.txt
If updated by the malware, a back-up of the first file is created as "clb.dll.bak".
Note that a legitimate file also named "clb.dll" exists by default in the Windows system folder. Because of how files in Windows are searched for and run, the malware file "clb.dll" is actually run instead of the legitimate file.
Spreads via...
Network access via RDP port 3389
Worm:Win32/Morto.C attempts to spread to other computers by checking for those connected via RDP sessions to other computers by default. It also enumerates IP addresses on the affected computer's subnet and attempts to connect to these computers using certain user names and passwords
Payload
Contacts remote host
Worm:Win32/Morto.C connects to the following hosts to download additional information and update its components:
- fc<random number>.j<removed>mt.net
- j<removed>fr.co.be
- j<removed>fr.co.cc
- j<removed>fr.info
- j<removed>fr.net
- qf<removed>l.co.be
- qf<removed>l.co.cc
- qf<removed>l.net
- sc.j<removed>mt.net
Newly downloaded components are saved as files using the following naming format:
<random characters>~MTMP<4 hexadecimal digits>.exe
Performs denial of service attacks
Worm:Win32/Morto.C may be ordered to perform denial-of-service (DoS) attacks against specified targets.
Terminates security processes
Worm:Win32/Morto.C terminates processes that contain the following strings in their name. The selected strings indicate that the worm is attempting to stop processes related to popular security-related applications.
- 360rp
- ACAAS
- ArcaConfSV
- AvastSvc
- FPAVServer
- FortiScand
- GDFwSvc
- K7RTScan
- KVSrvXP
- MPSvc
- MsMpEng
- NSESVC.EXE
- PavFnSvr
- RavMonD
- SavService
- SpySweeper
- Vba32Ldr
- a2service
- avguard
- avgwdsvc
- avpmapp
- ccSvcHst
- cmdagent
- coreServiceShell
- freshclam
- fsdfwd
- knsdave
- kxescore
- mcshield
- scanwscs
- vsserv
- zhudongfangyu
Clears system event log
Worm:Win32/Morto.C deletes the following system event logs:
Additional information
- Application log
- Security log
- System log
Worm:Win32/Morto.C reads configuration data from the subkey HKLM\SYSTEM\Wpa\md.
Analysis by Zarestel Ferrer
Last update 29 November 2011